1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
11

A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.

Computers and Technology
1 answer:
Archy [21]3 years ago
8 0

Answer:

The technician will want to add ACL for ports 20 and 21

Explanation:

The FTP protocol by default will attempt to use 21 for TCP access and 20 for data access.  By enabling an Access Control List (ACL) on ports 20 and 21, the technician can prevent FTP traffic from leaving the network on the default ports.

Cheers.

You might be interested in
Which backup requires a small amount of space and is considered to have an involved restoration process?
dusya [7]

Incremental backup needs a small amount of space and exists considered to have an involved restoration process.

<h3>What is Incremental backup?</h3>

A backup or data backup exists as a copy of computer data taken and stored elsewhere so that it may be utilized to restore the original after a data loss event. The verb form, directing to the process of doing so, exists as "back up", whereas the noun and adjective form is "backup".

An incremental backup exists a backup type that only copies data that has been changed or made since the previous backup activity was conducted. An incremental backup approach exists used when the amount of data that has to be protected stands too voluminous to do a full backup of that data every day.

An incremental backup exists one in which successive copies of the data contain only the portion that has been modified since the preceding backup copy was made. When a full recovery is required, the restoration process would require the last full backup plus all the incremental backups until the point of restoration.

Hence, Incremental backup needs a small amount of space and exists considered to have an involved restoration process.

To learn more about Incremental backup refer to:

brainly.com/question/17330367

#SPJ4

6 0
2 years ago
What is a symptom of a failing power supply? The display has only a blinking cursor. The computer displays a POST error code. Th
Mariulka [41]

Answer:

A sympton of a failing power supply is The computer sometimes does not turn on.

Explanation:

All right, the power supply is the terminal that receives electric current to process it and distribute it to the different parts of the hardware that compose the computer. When it fails, the current is not distributed and doesn't reach the different pieces of hardware. Therefore, option D) is the correct one. Another error that could be related is the malfunction of fans but it could be related to wires more than the power itself.

7 0
3 years ago
For any element in keysList with a value smaller than 40, print the corresponding value in itemsList, followed by a comma (no sp
givi [52]

Answer:

u look se33y yessir

Explanation:

......................................

7 0
3 years ago
A utility program that makes a copy of all files or selected files that are in the libraries is called ______
sleet_krkn [62]

Answer: File History

8 0
3 years ago
What special signal is issued periodically from an Access Point and contains the network transmission rate and service set ident
olya-2409 [2.1K]

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

6 0
3 years ago
Other questions:
  • The ____ operation is used to add an element onto the stack.
    15·1 answer
  • Which command can be used to manually add a package to the driver store?
    13·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • Tips for being confident and entertaining when presenting?
    6·1 answer
  • Write a program segment with a do-while loop that displays whether a user-entered integer is even or odd. The code should then a
    5·1 answer
  • Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, a
    9·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • This is 6th grade career class.
    10·1 answer
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!